Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.

Similar presentations


Presentation on theme: "Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers."— Presentation transcript:

1 Managing Information And Technology

2 Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers capture, store, and analyze data 3.Discuss ways IS can be designed 4.Describe information systems for networked computers 5.Explain how 4 networking technologies communicate 6.Identify/discuss challenges of e-commerce 7.Identify careers in information management

3 Data V. Information “…data- unprocessed facts.” “…information- data that have been processed, or turned into some useful form.”

4 Information System “…the combination of technologies, procedures, and people who collect and distribute the information needed to make decisions and coordinate and control company- wide activities.”

5 IS Management  Chief Information Officer  Chief Technology Officer  Information Managers Determine information needs Collect data Convert data into information Direct information

6 Differing Information Needs  Top Managers Planning Setting Objectives Strategic Decisions  Middle Managers Allocate Resources Oversee Activities  First-Line Managers Supervise Employees Oversee Daily Operations Coordinate Activities

7 Information Needs and Flows

8 Need To Share Information z Integrated IT z Enterprise Resource Planning System

9 ERP System

10 Data and Databases 5 Databases 5 Data Warehouse 5 Data Mining Customer Behavior Customer Relationship Management

11 Data Mining Process

12 Types Of Information Systems  Operations Support Transaction Processing Process Control Design & Production  Management Support  Decision Support  Executive Information  Artificial Intelligence Expert Face-Recognition

13 Transaction Processing System

14 Design And Production Systems  Computer-Aided Design  Computer-Aided Manufacturing  Computer-Integrated Manufacturing  Flexible Manufacturing

15 Decision Support Systems

16 Executive Information Systems  Artificial Intelligence Expert Systems Face-Recognition Technology “…senior managers [need] ready access to strategic information that’s customized to their needs... In a convenient format.”

17 Computer Networks h Applications Software h Local-Area Network h Wide-Area Network

18 Local Area Network

19 Data Communication Networks : Internet Internet Service Providers World Wide Web/Browsers : Intranets : Extranets “…transmit digital data… from one computer to another using...wired and wireless communication channels.”

20 Technology Of The Web  Web Pages  Web Sites  Webmaster  Home Page  Uniform Resource Locator  Web Server  Search Engine

21 Intranets/Extranets Intranet – “…a private network using… technologies… available only to employees....” Firewall – Software that controls access to an Intranet Extranet – “…intranet… partially available to certain parties outside the organization.”

22 Extranet

23 E-Commerce “…conducting business over the Internet...”

24 Business Uses Of The Internet  Presenting Information  Selling Products  Distributing Digital Products  Acquiring Goods/Services  Virtual Company

25 Electronic Data Interchange & Value-Added

26 Security Issues In Electronic Communication  Data Security  Malicious Programs  Spoofing  Revenue Theft  Risks to Customers

27 Malicious Programs  Viruses  Worms  Trojan Horses

28 Types Of Revenue Theft  Denial of Service  Piracy - Firewalls

29 Risks To Customers  Credit-Card Theft  Password Theft  Invasion of Privacy

30 How Cookies Work

31 Shoring Up Security And Building Trust Encryption – “…process of encoding data so...only individuals (or computers) armed with a secret code (or key) can decode it.” Certificate Authority – “…a third party… verifies the identity of the responding computer and sends you a digital certificate stating that it trusts the site.”

32 Careers In Information Management  Chief Information Officer  Chief Technology Officer


Download ppt "Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers."

Similar presentations


Ads by Google